The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

As
the
third
day
came
to
a
close
on
Infosecurity
Europe
and
our
stand
is
now
slowly
being
taken
down,
I
wanted
to
provide
some
key
highlights
of
the
whiteboarding
sessions
that
happened
live
on
our
interactive
graffiti
wall.
How
to
Protect
your
Crown
Jewels
First
up
was
David
Gray
from
our
... [ + Read more ]

This
post
is
contributed
by
Kim
Madia,
World
Wide
Product
Marketing
Manager
for
Infosphere.
During
a
recent
trip
to
a
client
site,
we
gathered
key
stakeholders
from
across
business
units
to
discuss
the
broad
topic
of
Data
Governance.
As
part
of
the
telecommunications
industry,
this
client
is
heavily
regulated
and
... [ + Read more ]

This
post
was
contributed
by
Luis
Casco-Arias,
Senior
Market
Manager
for
IBM
Security.
As
technology
evolves
and
becomes
more
ubiquitous,
it
is
imperative
to
re-think
our
approach
to
information
security.
Initially,
the
few
key
IT
assets
to
be
protected
belonged
to
enterprises,
and
few
people
had
the
expertise
or
resources
... [ + Read more ]

This
post
was
written
by
Glinda
Cummings,
World
Wide
Senior
Product
Manager,
zSecure
at
IBM.
When
it
comes
to
enterprise
security,
no
news
is
not
necessarily
good
news.
A
lack
of
alerts
about
attempts
to
attack
your
system
doesn’t
mean
they
didn’t
happen—because
chances
are,
they
did.
Many
large
organizations
... [ + Read more ]

This
post
is
an
excerpt
from
the
IBM
Mainframe
Insights
blog
found
at
http://ibm.co/SystemZBlog
and
was
written
by
Tom
Turner,
VP
of
Marketing
for
IBM
Security.
Read
the
full
post
here: http://ibm.co/Tb4Ibl.
"The
mainframe
has
a
rich
and
proven
legacy
of
providing
an
industrial
strength
combination
of
hardware
and
software
security
functions
... [ + Read more ]

Being
able
to
simultaneously
share
and
protect
sensitive
information
is
one
of
the
biggest
challenges
today.
We
need
to
be
confident
that
the
right
people
have
access
to
the
right
information,
but
we
also
don’t
want
to
accomplish
this
at
the
expense
of
business
agility.
Our
world
demands
that
we
... [ + Read more ]

It
seems
that
we
can’t
go
more
than
a
day
or
two
without
hearing
another
story
about
data
loss.
Whether
it
is
the
result
of
an
insider
threat
or
an
external
attacker,
being
able
to
protect
your
data
has
never
been
more
important.
However,
this
has
also
got
to
be
... [ + Read more ]